January 16, 2019 •
Security, Top Stories •
Fundi •
Comments Off on What we can expect from IT security in 2019
The last three years in IT innovation have laid the foundation for even greater changes within the technology sphere. While some of these changes will simply build on developments in IoT, AI, smart industries and smart homes as well as the cloud, others such...
Kaspersky Lab technologies have automatically detected a new exploited vulnerability in the Microsoft Windows OS kernel, the third consecutive zero-day exploit to be discovered in three months. The latest exploited vulnerability (CVE-2018-8611) was found in...
In the first half of 2018, global data breaches compromised an estimated 4.5 billion data records worldwide. These attacks have seen millions of people’s personal and financial information put at risk, and demonstrate the need for security across all...
December 21, 2018 •
Security •
Darryl Linington •
Comments Off on Beware of cybercriminals who prey on holiday shoppers
While e-commerce sites are the primary target because hackers can scrape data from millions of cards, consumers have a job to do when it comes to protecting what’s in their wallet, warns Jeremy Samide, CEO of Stealthcare. Samide tells consumers,...
December 12, 2018 •
Security •
Darryl Linington •
Comments Off on F5 releases first annual Application Protection Report
A recently released report by F5 Networks has shed light on the frequency and nature of web application attacks. The first annual Application Protection Report from F5 surveyed 3,135 IT and security practitioners across the globe, while additional research...
November 23, 2018 •
Security •
Danielle Kruger •
Comments Off on Forcepoint Cybersecurity Predictions for 2019
Today we announce the release of our 2019 #Cybersecurity Predictions Report! This year’s report includes insights about #AI, cyber cold warfare, and where cyber professionals expect risks to increase in general. Read the full report:...
November 20, 2018 •
Security •
Danielle Kruger •
Comments Off on Shadow IT – is it as ominous as it sounds?
The dark, foreboding presence of shadow IT inspires fear in most IT departments, sneaking into businesses undetected as people download their own, unapproved applications, software and even devices. However, is shadow IT as ominous as it sounds? And, if so,...
November 9, 2018 •
Security •
Danielle Kruger •
Comments Off on No one is to be trusted when it comes to online data
A new study of mid-size businesses and consumers reveals that many are confused and lack trust when it comes to the privacy and security of their online data and behaviour. The research, which covered six countries in Europe and North America, found that...
November 9, 2018 •
Finance •
Neo Sesinye •
Comments Off on IT Spending in EMEA to total $973 Billion in 2019 – Gartner
IT spending in EMEA is projected to total $973 billion in 2019, an increase of 2 per cent from the estimated spending of $954 billion in 2018, according to the latest forecast by Gartner, Inc. “2018 is not a good year for IT spending in EMEA,”...
November 7, 2018 •
Security •
Darryl Linington •
Comments Off on Naive employees are the greatest risk to a company’s cyber security
The greatest threat to the data security of any organisation is often traced to an oblivious employee who has inadvertently brought a company to its knees by allowing confidential and sensitive data to be hacked. Cyber forensic security expert, Rudi Dicks,...
November 6, 2018 •
Security •
Danielle Kruger •
Comments Off on Your digital identity could be on sale for less than $50
While many of us have heard of, or even fallen victim to, cybercrimes such as data and identity theft, it seems that relatively few know the value of the information stolen from us. A new study from Kaspersky Lab has revealed that while our identity may not...
October 30, 2018 •
Security •
Darryl Linington •
Comments Off on Over 100 security professionals tell Cofense how they combat corporate phishing
Threat actors understand that one of the easiest and most cost-effective ways to enter an organisation illicitly is by tricking legitimate employees into allowing the threat actor into the infection process and thereby breaching the company’s defences. This...
October 27, 2018 •
Security, Top Stories •
Danielle Kruger •
Comments Off on Scholars beware: phishing fraudsters hunt for university credentials
Kaspersky Lab urges academics to be careful online: the company’s researchers have detected multiple cyberattacks hitting at least 131 universities in 16 countries, including South Africa, where several well-known universities have experienced at least...
According to legislation, businesses are required to manage the complete destruction of all data when IT assets reach end-of-life. Blancco has now introduced Erasure-as-a-Service, a certifiable secure data erasure solution that is PoPI compliant. Blancco...
October 26, 2018 •
Security •
Darryl Linington •
Comments Off on Why the office of the future will demand stronger security measures
In today’s age of innovation, enterprises are understandably concerned with how new technologies will impact the way jobs are performed in the next few years. The office of the future is forcing business leaders to grapple with how to seamlessly...
October is a month dedicated to Cyber Security Awareness. As a part of this marathon, Falcongaze analysts have decided to share with you some lifehacks that can help secure accounts. It is important, considering the growing scale of leakages that disclose...